Security Concepts
by Travis H.
Publisher: subspacefield.org 2010
Number of pages: 244
Description:
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.
Download or read it online for free here:
Download link
(1MB, PDF)
Similar books
Security and Privacy for Microsoft Office 2010 Users
by Mitch Tulloch - Microsoft Press
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
(9546 views)
by Mitch Tulloch - Microsoft Press
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
(9546 views)
What If Crime Were Impossible?
by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(9839 views)
by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(9839 views)
The Developer Highway Code
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(19304 views)
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
(19304 views)
Cryptography and Security in Computing
by Jaydip Sen (ed.) - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
(20244 views)
by Jaydip Sen (ed.) - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
(20244 views)